fkie_cve-2010-3677
Vulnerability from fkie_nvd
Published
2011-01-11 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3983147C-7775-4FBC-85B1-E33DB1EDD669",
"versionEndIncluding": "5.1.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1092CB84-5263-49AF-A9E3-D36FA2A699A3",
"versionEndIncluding": "5.0.91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE3D740-E7E8-4E4E-BA75-899015500396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*",
"matchCriteriaId": "6421D8E6-6769-400E-A7EA-DA683F637F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
"matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
"matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
"matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*",
"matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*",
"matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*",
"matchCriteriaId": "533421DF-D468-4E83-B27D-612778735F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*",
"matchCriteriaId": "1F307DFE-D497-4494-91FF-B056E70C71A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*",
"matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*",
"matchCriteriaId": "FFF392C0-4042-4E91-890F-71C0C05AAB56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*",
"matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
"matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*",
"matchCriteriaId": "8462FC32-D6C8-448C-992F-F13C63D163BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "5B91B6CB-624D-429C-86CD-28CBA1A8AD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*",
"matchCriteriaId": "E1DFB3DB-FBD9-4542-82B9-C7EA603135EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*",
"matchCriteriaId": "7A77E76D-1CE4-446C-9F2D-18913BE0F4B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*",
"matchCriteriaId": "D01C656F-C7CE-4625-9C7C-A160291E327F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
"matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB3A560-CAC3-4173-BA24-A00E85A10C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F17925-3F60-4DA8-86D6-596AC8A7466D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9B3CCC-7FE4-48FA-8DC6-F508999E9406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
"matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*",
"matchCriteriaId": "18F1CDDF-D1ED-4A9A-A34F-757C2B8FD4EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*",
"matchCriteriaId": "0E20D59E-D30F-4FCD-B3E7-69BA102E434A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
"matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
"matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*",
"matchCriteriaId": "DA8DC8BB-6339-4FF7-A334-DE0DDE3FB3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
"matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
"matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column."
},
{
"lang": "es",
"value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.0 anteriores a 5.0.92, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio de mysqld) por medio de una consulta join que utiliza una tabla con una columna SET \u00fanica."
}
],
"id": "CVE-2010-3677",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-01-11T20:00:01.323",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.mysql.com/bug.php?id=54575"
},
{
"source": "cve@mitre.org",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
},
{
"source": "cve@mitre.org",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42875"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42936"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT4723"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2143"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/42646"
},
{
"source": "cve@mitre.org",
"url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-1017-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0105"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0133"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0170"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0345"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.mysql.com/bug.php?id=54575"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42875"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/42936"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/28/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/42646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1017-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0345"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…